Part I: Networking Basics: How Do Networks Work?
Chapter 1: Workstation Network Con?guration and Connectivity
Chapter 2: TCP/UDP Basics
Chapter 3: Network Applications
Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?
Chapter 4: Scanning and Enumerating the Network for Targets
Chapter 5: Attacks?Web Server, E-mail, DOS, and Trojan Attacks
Chapter 6: Escalating Privilege? Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems?
Chapter 7: Hardening the Host Computer
Chapter 8: Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?
Chapter 9: Preparing for and Detecting Attacks
Chapter 10: Digital Forensics